GSN October/November 2014 Digital Edition

Page 1

G O V E R N M E N T

Security News October/November 2014 Digital Edition j

Los Angeles Sheriff’s Department and Geofeedia write the playbook on using Social Media and location based technology in law enforcement. Page 11


æ TA B LE

OF

C O N T E N T S N E W S

A N D

F EA T UR ES

OCTOBER/NOVEMBER 2014 SPECIAL REPORTS

Big update in law enforcement tool-kit “ Our successful joint operation with the FDA proves again the relevance of social media in intelligence-led policing. Our eComm unit delivers great value by providing real-time, actionable intelligence to our field officers. Geofeedia’s location-based social media monitoring solution is a powerful tool to help us deliver that value.” Commander Mike Parker, Los Angeles Sheriffs Office

Page 11

Port of Charleston, SC integrates fence detection and video analytics PureActiv® provides intelligent video analytics, 3D geospatial command and control, autonomous PTZ tracking and open architecture for ease of integration with the MicroPoint™ Cable system which pinpoints fence cut or climb attempt to within 3m, while ignoring environmental disturbances such as wind, rain or vehicle traffic.

Page 26

2 Government Security News

October/November 2014

Digitlal Edition

8

Cybersecurity Workforce Competencies: Preparing Tomorrow’s Risk-Ready Professionals

18

23

28

X-ray systems manufacturer Astrophysics awarded $6 million U.S. Navy Contract Page 4

F-35C Completes First Arrested Landing aboard Aircraft Carrier Page 23

Hey, Governors Christie and Cuomo! Good job with the Airports. But what about the Seaports? asks Denise Krepp In “Ebola by Sea” Page 6

Romanowich on Video Surveillance New physical standards in the Works for electrical substations

Don Waddell of (ISC)2/University Of Phoenix initiative wants to close the supply demand gap in filling cybersecurity jobs Page 8

Page 24

Port of Charleston, SC Case Study Puretech Systems Integrates Fence Detection and Video Analytics at Port with $50 billion annual cargo Page 26

Law Enforcement Communications L.A. Sheriff’s Department (LASD) and Geofeedia write the playbook on using Social Media and location based technology Page 11 BriefCam Syndex offers rapid view video synopsis At Israel Exhibition Page 16

Kastle Systems/Metro DC Police launch City-wide network of video cameras and floor plans Page 18 Mutualink Unveils Mobile Go Kit for Interoperable Public Safety Community at IACP Page 20

Digitlal Edition

October/November 2014

Government Security News 3


æ UPFRONT

Astrophysics Inc. awarded $6 Million United States Navy Contract

contract to supply and deploy ruggedized X-ray inspection

Rapidly growing X-ray systems manufacturer Astrophysic Inc of City of Industry, CA, has won a $6

systems. According to company sources, Astrophysics’

Astrophysics’ XIS-

competitive advantages in the bidding included not only

7858 system which

that the company buys primarily from U.S. vendors, but

features a standard

also that it has its own fabrication facility, enabling it to

180kV generator for

pass manufacturing savings along to customers.

heightened penetration

“Astrophyics is known around the world for market-

ABOUT ASTROPHYSICS INC.

The Navy selected

and enhanced object recognition. The XIS-7858

million dollar contract from the U.S. Navy to protect

leading solutions,” said Francois Zayek, Founder and

is the ideal screening solution for any location in

entry control points deployed at seaports around the

CEO of the company and a former VP of Research,

need of increased screening dimensions within

world. The company’s X-ray solutions will be used to

Development and Engineering at Perkins Elmer, who is

a consolidated space. The Indefinite Delivery,

screen visitors and personnel before they embark and

known globally for his engineering innovations. “We have

Indefinite Quantity (IDIQ) contract was issued by

to accelerate offloading processes.

a long history of helping protect men and women that

the Navy XRBS program which is managed by the

protect our great nation and we are pleased to announce

Crane Division out of Indiana. Ω

Astrophysics was selected from a large field of competitors to fulfill the Navy’s XRBS program’s five-year

Astrophysics offers X-Ray security screening systems that help operators detect and identify weapons and explosives in civil and military markets worldwide. The company exports to over 60 countries and builds all its own products domestically in Southern California. The corporate hearquarters located in City of Industry, CA is the manufacturing facility for air cargo, conventional and mobile solutions. A second facility in Ontario, CA is the primary location for research and development, and the high energy cargo and portal systems. Astrophysics markets range from Air Cargo, Aviation and Transport to Corporate and Hotels, Customs and Border Protection, Government, Law Enforcement and the Military. The company employs over 140 employees in the U.S. and has affiliate company’ globally. For more information about Astrophysics, visit www.astrophysicsinc.com.

this contract.”

THE NEW ENTRY

GUARANTEED DELIVERY DATES

for ACCESS CONTROL POINTS FULLY GALVANIZED FRAMEWORK

SINGLE SOURCE FOR PHYSICAL SECURITY a AMERISTARBOOTHS.COM

4 Government Security News

October/November 2014

Digitlal Edition

| 855.526.6847

Digitlal Edition

October/November 2014

Government Security News 5


æ UPFRONT

Ebola by Sea BY DENISE RUCKER KREPP Over the past several days, governors in New York, New Jersey, Illinois, and Connecticut issued quarantine guidance for individuals who’ve been in contact with African Ebola patients. The state guidance focuses on individuals who’ve returned to the U.S. via airplanes. At some point a mariner is going to arrive, sick with the dangerous disease. Unfortunately, the federal government has yet to address this possibility and state governors won’t be willing to wait for the bureaucratic federal machine to churn out vague policy guidance. They’re going to issue state guidance and this guidance could significantly impact U.S. port operations nationwide. The U.S. Coast Guard is the federal agency responsible for port operations and the Coast Guard Captain of the Port manages port operations on a dayby-day basis. This individual can prevent a foreign flag ship from entering a U.S. port. He or she can also require foreign flag vessels who have ported Sierra Leone, Guinea, and Liberia, Ebola stricken nations, to undergo additional scrutiny before they are allowed in U.S. waters. The agency released a marine safety information bulletin last week that everyone in the maritime industry should read. The bulletin recommends that “local industry stakeholders work with the Coast Guard Captain of the Port to review and be familiar with their Marine Transportation System Recovery Plan.” These plans were mandated after the 9/11 attacks and the agency issued guidance earlier this summer on how to draft them. As someone who doesn’t believe in re-inventing the wheel, I strongly support using existing guidance 6 Government Security News

October/November 2014

to address current crises. The problem in this situation is that the recovery plans don’t address Ebola-like catastrophes. These plans focus on terrorist attacks and natural hazards similar to Hurricanes Katrina and Sandy. They don’t address a ship manned with mariners decimated by Ebola. The Coast Guard appears to recognize the shortcomings of the current recovery plan by recommending in the October 22nd bulletin that the local stakeholders “consider conducting a table top exercise to plan and address items such as an evaluation of how to handle a vessel arrival with a suspected Ebola case... what steps need to be considered if a medical evacuation is needed, and possibly how a ship would be decontaminated in order to commence cargo transfers.” Good idea. A seaport is a finely-tuned machine. According to the Bureau of Transportation Statistics, in 2011, 7,662 oceangoing vessels made 67, 929 calls at U.S. ports. Time is money for vessels owners – they want to enter a port, discharge their cargo, taken on new cargo, and depart as fast as they can. They are not going to want to wait for the Coast Guard Captain of the Port and local stakeholders to decide how to address a vessel with a suspected Ebola case. A simple answer would be to ban all ships that have stopped in Sierra Leone, Guinea, or Liberia in their last five previous ports of calls. Sadly, that won’t work because the U.S. government is sending U.S. ships to these countries to provide food aid and medical support. People in Ebola areas need to eat and U.S. grown crops are helping them to survive. It would immoral to stop shipping food to those in need. Digitlal Edition

If the U.S. can’t ban all ships that have ported in Ebola-stricken countries, then the U.S. Coast Guard must develop a more comprehensive plan to address the possibility of Ebola victims arriving in the U.S. by sea. The agency can’t merely recommend that local stakeholders conduct table top exercises. These exercises should be mandatory and the Coast Guard must be ready to provide substantive guidance. Keeping in mind that several governors have already issued isolation guidance for air travelers, the Coast Guard must work the governors now to address the maritime sector. How are sick mariners evacuated? At sea via helicopter or a smaller vessel? At the port by ambulance? How is the vessel decontaminated? How and when are the necessary personnel going to be trained to carry

out the evacuation and decontamination procedures? What happens to the other in-coming vessels during the decontamination process? If the Coast Guard can’t answer these questions, the state governors will because they won’t their ports contaminated with the Ebola virus. Ports bring in revenue and the revue can’t drop. The Coast Guard prides itself on being Semper Paratus. Now, more than ever, it must live up to its motto. The nation’s ports can’t be shut down because of Ebola and they won’t be if the Coast Guard develops more comprehensive guidance before the first ship arrives. Pre-planning with local stakeholders, including governors, will ensure that the country’s supply chain continues to operate. Call your local Captain of the Port and ask him or her to schedule the table top exercise. Ω

PHYSICAL SECURITY with COMPLETE PERIMETER CONTROL

ANTI-CLIMB FENCE

RETRACTABLE WEDGES

ANTI-RAM FENCE

SECURITY BOLLARDS

Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com Digitlal Edition

October/November 2014

Government Security News 7


æ UPFRONT

Dan Waddell discusses urgency of (ISC)2 Foundation/ University of Phoenix initiative to close the supply and demand gap in filling cybersecurity jobs

T

urgency, in short, is that there is a serious gap between

he core mission of the (ISC) Foundation, in the 2

supply and demand in the realm of cybersecurity

simplest of terms, is to support cybersecurity

professionals.

education and awareness. With a global

Cyber security accounts for approximately 10% of all

membership of over 100,000 certified information

IT occupations, and cybersecurity-related positions are

security professionals, (ISC)2 exists “to ensure that

growing faster than all IT jobs. Cybersecurity job openings

children everywhere have a

take 24% longer to fill than all

positive, productive and safe

IT openings, and 36% longer to

experience online; to spur

fill than all vacancies, regardless

the development of the next

of industry. U.S. employers pay

generation of cybersecurity

qualified candidates a premium

professionals; and to illuminate

for cybersecurity jobs – an

major issues facing the issue

average of $93,028 annually,

now and in the future.”

or over $15,000 more than other IT jobs overall. In 2013,

At the 2014 ASIS Conference, which hosted over 20,000 visitors,

U.S, employers posted 50,000

1,600 of the attendees were

new jobs requiring Certified

there to attend the co-located

Information Systems Security

(ISC)2 conference, according to

Professionals (CIISP) credentials,

Dan Waddell, Director of US

but there were only 60,000 total

Government Affairs of (ISC)2, who

Cybersecurity Workforce Competencies: Preparing Tomorrow’s Risk-Ready Professionals

existing CIISP holders.

“It’s an education-to-workforce gap,” said Waddell,

spoke with GSN a few days after the ASIS Conference about the rationale behind the huge delegation. The

and it’s hindering the efforts to fill cybersecurity jobs.”

obvious opening question was, What’s the urgency?

According to recent findings by Cisco, he pointed out, there are a million jobs that are not being filled. “The

Waddell had a strong answer to this question, one that arose from his own knowledge of cybersecurity and

supply has gone up slightly, but the demand has gone

was further informed in great detail by an in-depth report

through the roof.” “The CISSP is the gold standard of information

commissioned by the University of Phoenix and (ISC)

2

that was named, “Cybersecurity Workface Competencies:

security professionals,” he said, “but it’s not just ‘tech’ that

Preparing Tomorrow’s Risk-Ready Professionals.” The

they need. “We’re trying to teach students the importance

8 Government Security News

October/November 2014

of the cyber battlefield and the tools they need to

cybersecurity professionals, and to identify actionable

defend it – not just the software and hardware, but also

recommendations for key stakeholders to better prepare

knowledge and experience. An effective cybersecurity

students to enter careers in cybersecurity.

professional should have a good balance of education

The focus was on identifying what educational

and experience on his or her resume. A credential serves

institutions, employers, industry associations and

as a validation mechanism. Giving students a head start

students can do to bridge three education-to-work gaps:

on the education piece is where (ICS)2 can help through

a competency gap, a professional experience gap; and an

its Global Academic Program, which gets colleges and

education speed-to-market gap. The roundtable partners

universities working with our common body of knowledge

included representatives from institutions of higher

to help introduce cybersecurity topics in their curricula.

education that educate cybersecurity professionals;

We need kids to major in cybersecurity.

organizations that employ cybersecurity professionals;

The reason we have the gap, according to Waddell,

industry associations that support and provide

is that “cybersecurity is still a relatively new industry –

certifications to cybersecurity professionals; and the

compared to other disciplines such as law or medicine.

Department of Labor, which develops research and tools

Until very recently,

for workforce prosperity

we haven’t had a real

and achievement.

definition of a career

$4.7

63%

path in cyber, and even know what job titles to assign. We have to understand requirements first, then align skills and

Billion

Billion

sometimes we don’t CISO

$445

CIO

The roundtable also incorporated the perspective of a cybersecurity student/

63 % of U.S. Federal CIOs (Chief Information Officers) and CISOs

Annual cost

Proposed annual

U.S. Department of Defense

(Chief Information Security Officers) say

improving cybersecurity is a top priority

spending on cyber activities

of computer- and network-based crimes worldwide

Sources: Homeland Security News Wire, “Improving Cybersecurity Top Priority: Federal CIOs, CISOs,” June 12, 2014, http://www.homelandsecuritynewswire.com/dr20140612improving-cybersecurity-top-priority-federal-cios-cisos. Andy Sullivan, “Obama Budget Makes Cybersecurity a Growing U.S. Priority,” Reuters, April 10, 2013, http://www. reuters.com/article/2013/04/11/us-usa-fiscal-cybersecurity-idUSBRE93913S20130411. Tom Risen, “Study: Hackers Cost More Than $445 Billion Annually,” U.S. News & World Report, June 9, 2014, http://www.usnews.com/news/articles/2014/06/09/study-hackers-cost-more-than-445-billion-annually.

career-starter on higher education practices and career entry. The findings of

competencies through a common framework, so that

these groups and other thought leaders with relevant

we’re all on the same page. DHS and NIST have developed

experience in competency modeling, higher education,

such a framework under a program called the National Figure 1. Most major cybersecurity breaches have one of seven causes.

Initiative for Cybersecurity Education (NICE). So that’s a

cybersecurity services and cybersecurity credentialing Figure 2. Ninety-four percent of cybersecurity breaches in 2013 fell into these nine categories.

resulted in the recommendations coming out of the

4.55% great start. (ISC)2 is supplying 11.18% credentials that ■align with CEO/president/ 5.18%

4.55% which were report, designed to be useful to the larger ■ CEO/president/ 11.18% 5.18%

the NICE framework.”

owner/principal/ 8.07% Distributed community of6%industry leaders, employers, educators and partner denial-of-

general manager/ owner/principal/ Naive8.07% end users partner and disgruntled ■ Chief security employees officer Users not perimeter ■NoVice President keeping up with protect ■ to Director new tactics 28.57% ■ Manager ■ Supervisor of 42.44% security personnel

42.44%

Mobile Note. Total who responded to the question = 483 (100%)

Note. Total who responded to the question = 483 (100%)

As co-hosts of the “Cyber Workforce Competencies”

general manager/

Physical theft/loss

report co-hosted by the University of Phoenix, and the Top 7 causes (ISC)2 Foundation, the host organizations relied on Under-

of cybersecurity

estimating devices as breaches findings from an industry roundtable with cybersecurity cyberideal entry criminals

points

professionals and talent leaders, with the objective

Lackcareer of a layered priorities of investigating competencies and Loss of mobile of defense

Digitlal Edition

devices

28.57%

Most

■ ■ ■ ■

Vice President Director Manager CyberSupervisor of espionage security personnel

Editor’s Note: Common Miscellaneous categories of errors This is thecybersecurity first of several articles that GSN intends to publish breaches Point-of-saleintrusions based on the information released in the University of Phoenix/ Crimeware Payment (ISC)2 Foundation’s Cybersecurity Workforce initiative and report. card Insider misuse

Digitlal Edition Source: Kaseya.

Other ■ Chief security

service

Web officerapp current attacks or future cybersecurity professionals. Ω attacks

skimmers

October/November 2014

Source: Verizon, based on reports from 50 companies.

Government Security News 9


Law Enforcement Communications

Radiation Identification

L.A. County Sheriff’s Department and Geofeedia write the playbook on using social media and location-based technology in law enforcement

The detection and analysis of hidden radioactive nuclides requires radiation identification instruments with high sensitivity and accuracy. The expense, weight and complexity of this equipment prevents many safety and security teams from having the right tools to manage a dangerous radiation scenario. The new Thermo Scientific™ RadEye™ SPRD Spectroscopic Personal Radiation Detector makes radiation identification accessible and affordable. The palm-sized, RadEye SPRD is a high-performance, radiation monitor designed to expose, locate and identify radioactive nuclides such as orphaned or hidden sources. Like the trusted Thermo Scientific™ RadEye™ PRD Personal Radiation Detector, the RadEye SPRD is intuitive, rugged and operates 170 hours on standard AAA batteries. This combination makes it the perfect solution in unpredictable and challenging scenarios. With a low cost of ownership the RadEye SPRD is an affordable way to put radiation identification in the hands of the entire team.

is within grasp • Get the New RadEye SPRD brochure: thermoscientific.com/sprd Talk to an Expert: 1-800-274-4212

Detect, Locate and Identify radioactive threats with the new RadEye SPRD.

E

arlier this year, the Los Angeles County Sheriff’s Department (LASD), under Commanders Scott Edson and Mike Parker sent out an invitation to 19,000 law enforcement agencies in the U.S. and overseas inviting them to try a new crowdsourcing platform called LEEDIR, by which eyewitnesses to a crime or emergency, anywhere, could upload and share high-resolution photos and videos with law enforcement agencies for free and in real-time. At GSN, we were so impressed with this initiative that we labeled it “History in the Making” and ran a front page cover story on it in our April 2014 Digital Edition.

© 2014 Thermo Fisher Scientific Inc. All rights reserved. All trademarks are the property of Thermo Fisher Scientific and its subsidiaries.

10 Government Security News

BY ADRIAN COURTENAY

Now, half a year later, the L.A. Sheriff’s Department

October/November 2014

Digitlal Edition

technology developed by Geofeedia of Chicago, IL. Geofeedia’s unique approach organizes social media by location, as opposed to the long-standing industry approach of organizing social media solely by keyword or hashtag without regard to location. The result: a new set of data focused on the places where events happen. The key to the new approach is that emergency services, including law enforcement, place a Geofeedia virtual perimeter around a designated geographical area – which can be as big as a city or as small as a single

is once again sharing law enforcement history, this time

address – and then monitor social media openly shared

by using innovative crowd sourcing and social media

by the public within that perimeter.

Digitlal Edition

October/November 2014

Government Security News 11


Grundy County Sheriff ItLaw started with school safety • Geofeedia Enforcement Communications In a discussion with GSN, LASD Commander Mike Parker SITUATION: made have it clear thatvulnerable one of the Schools been to acts of violence at an most surprising revelations alarming rate in recent months. More than 7 percent of 9th through graders being about 12th the use of a reported “geo-fence” is threatened or injured with a weapon on school property that many people at the scene at least once in the last

year. An additional 6 percent admitted to bringing a weapon

of a crime or an emergency

to school for protection.

in progress often openly post

located on Cleveland’s west side when a group of 20 men

introducing it to students as an important tool in modern

surrounded him on the sidewalk. The group attacked and

crime fighting:

severely beat the man, stole his phone, and ran. Immediately following the crime, Patrol Sergeant Tanya Sirl used Geofeedia to draw a perimeter around the scene of the In the wake of this incident, GrundyofCounty Sheriffand has the outset the incident incident and surrounding areas, searched back to the time of taken full advantage of had Geofeedia to monitor social woman who the crime, and began scouringobserved the socialamedia content. media in locations beyond schools in the neighboring

had seized a knife from a store

towns. According to GIS Analyst Dave Ostrander, the It was while reviewing these postsand thathad sheslashed came across display a easy navigation and reliability of the application has been individuals who had posted to Facebook about going toThe a number of other customers. fundamental to the success of Geofeedia in Grundy County. “93rd Street block party” deputy (a common gang reference often responded by and drawing Ostrander knows that it can help solve crimes provide synonymous with being up to no good). weapon and facing the situational awareness tohis potential public safety down hazards.

information onto the Internet,

specifically in social media, and a founder found at an Oswego school through Geofeedia’s social of before they even think of dialing media monitoring software.

Geofeedia

LASD Commander ADDITIONALLY: Michael J. Parker

to combat violent crime because it is the best way to monitor high crime areas. With what people are posting these days, it doesn’t take much time to find evidence against criminals. It is simply amazing what can be done with this platform.”

enables law enforcement agencies to be

her hand with blood dripping off

more effective in dealing with emergency

of it. In the last moment before

situations ranging from teen suicide,

he had to shoot, the woman

natural disasters to shooting and threats

Another example of the importance of Geofeedia within Grundy County was the monitoring of an ice jam on the

911 and reporting it to the

dropped the knife and was put into handcuffs by the off

police. Often, the public share postings, including the

duty and other who hadWith just the arrived haddeputy to respond quicklydeputies to the situation. help on of

“Geo-Tagging”, which indicate the latitude and longitude

the scene, with no loss of life. Geofeedia, officials in Wilmington, Illinois were able to

Kankakee River. Emergency responders were notified and

“First responders need reliable, accurate information,” Harris indicated, “and that can be obtained within 15 feet of the person posting because of the GPS coordinates produced by Geofeedia. “We have gathered hundreds of millions of social media posts on behalf of our customers across Twitter, Instagram, YouTube, Facebook, Picasa, Flickr and other sources,” he said. “It starts with a map. Then you select the location you want to focus on and

- Patrol Sergeant Tanya Sirl

woman, who still had the knife in

Geofeedia Case Study: Hate Crime in Cleveland

Grundy County, Illinois had its own scare when a gun was Phil Harris, CEO

“Geofeedia is something we are all using as a tool

adjust the boundaries. Social media posts will then pop

against schools. A great deal of information shared by social media, Parker pointed out, is

of the exact location. Prior to the days of social media,

monitor social media in thedid area and view photos The question was, how the reporter know posted about

“open source information”, meaning that

he said, the typical scenario was that if members of the

byongoing citizens situation in real-time, therefore assisting responders the before the police knew about it? with

it is shared for the world to see, including

public saw something suspicious, they would call the

The answer was clear: Social media, which was obviously

law enforcement. There is no reasonable

police and the police would send a patrol car to see if

being followed regularly by reporters. In Parker’s words,

expectation of privacy if it’s shared in a way

the report was accurate and then act on it. In addition to

“All of the news media these days are monitoring social

that “A boy in a basement in Belgium could

SOLUTION: keyword searches, now that law enforcement can access

media. If they’re not, they’re way behind the times and

view the same information” he said. “But a

Officers were able to react quickly based on area, intelligence social media activity within a geo-fenced he pointed

their competitors. Tools like Geofeedia are extensively

line is drawn where there is password protection because

used by leading news agencies.”

then there usually needs to be an ongoing criminal

up within those boundaries. In addition, if you find a post

investigation or potentially a search warrant signed by a

you're interested in, you can blow it up and put in on a

judge to get that information.”

map. One of the most powerful things about Geofeedia,”

provided the location-based platform through postings out, theby police can get additional focused, geographically on several social media outlets. Real-time tweets coming

relevant and important information, and they get it faster.

from inside the school were communicated to police officers

Describing an incident that he had experienced a

on the scene. Geofeedia allowed law enforcement to draw

additional actionable data.

According to Commander Parker, surveys have indicated that about 8% of the U.S. population uses

In a separate interview with GSN, Phil Harris, CEO

he added, is that in addition to location, you can also locate

few years around earlier,the Commander Parker said he was received a a perimeter area in order to see what

geotags when sharing opening by social media on their

phone callinside from aschool newswalls. reporter asking about a shooting taking place After officers secured the

mobile phones, thereby making their global position

and a founder of Geofeedia, agreed with Commander

by word or phrase. You can also take data that’s in the

perimeter the school, was discovered that the gun that hadaround supposedly takenitplace, with people being

public information, since their geotags give latitude and

Parker in pointing out that law enforcement wasn’t the

public domain and take it to a location. You don’t need to

was by at a contractor in the faculty bathroom. The hitdropped by bullets, a local supermarket. When sheriff’s

longitude and often include tags of photos on social

first sector to use social media, since the marketing and

go to the Instagram site. You can see it all on Geofeedia in

media. He added that the percentage is probably twice

business worlds had been mining social media and crowd

a single search, which makes it fast and efficient for first

that number, or 16%, when teenagers share openly. This

sourcing for many years. But law enforcement is learning

responders.

students were safe and thescene, weapon was secured thanks to deputies arrived at the they learned that an off the services provided by Geofeedia.

duty deputy sheriff had been in the supermarket at

fast that everyone with a phone or a camera is an “Geofeedia is easy to use and always works. Its technology has solved crimes and provided our squad cars with visibility into what is taking place during some very sensitive situations.” - Dave Ostrander | GIS Analyst 12 Government Security News

October/November 2014

Geofeedia Case Study: Grundy County Sheriff

Digitlal Edition

According to L.A. County Sheriff’s Department Deputy

eyewitness that can support first responders by sharing

Tony Moore, who worked with Commander Parker and

what they see through social media posts, he said, as the

used the law enforcement Geofeedia app, illegal pre-

capture of the Boston bombers demonstrated.

planned teen drug parties had become an escalating

Digitlal Edition

October/November 2014

Government Security News 13


the Nozz distribution network also eliminated a significant

organization plans to continue spreading their knowledge

revenue source for gangs. To fund other criminal activities,

about Geofeedia.

gangs often taxed Nozz distribution at drug parties. The

Law Enforcement Communications • Geofeedia

About Geofeedia

operation also reduced an environmental threat. Federal authorities have estimated that the damage to the ozone

problem in Los Angeles County and its population of ten million people across 88 municipalities and 130 unincorporated communities. Pre-planned teen drug parties had become an escalating problem in Los Angeles County, contributing to a measurable increase in felony and

from the illegal use of nitrous oxide in the greater LA area is more than what a small oil refinery in the center of the city

data by location to provide users with real-time insights

were seized as evidence, including assault weapons, armor piercing rounds, and high capacity magazines. Another the intention to sell them (a felony charge). Finally, with

events that were primarily organized and

Geofeedia’s location-based social media monitoring and

(eComm) which had been founded in 2012, used key word search systems such as Hootsuite and the Geofeedia patented, cloud-based program to search, monitor and analyze real-time openly shared social media posts via social media networks. “What we like about Geo-searching is a look at a particular location, draw a map and immediately start

Request a free demo at: geofeedia.com/demo

of multiple suspects on weapons charges. Thirteen guns

suspect was arrested for possession of narcotics with

the 24-hour LASD Electronic Communications Triage Unit

from anywhere in the world.

In addition, the search warrants also resulted in the arrest

vehicular burglary, and gang activity – all

To police the pre-planned parties,

About the Los Angeles County Sheriff’s Department

keyword analysis the eComm unit interdicted more than 1,000 parties and reduced felony assaults by 50%.

The Los Angeles Sheriff’s Department is the largest sheriff’s department in the world with a mission to “lead the fight

“Our successful joint operation with the FDA proves

to prevent crime and injustice, enforce the law fairly and

again the relevance of social media in intelligence-

defend the rights of all, including the incarcerated.” The

led policing. Our eComm unit delivers great value

department is divided into eleven divisions and specialized

by providing real-time, actionable intelligence to

services including four patrol divisions, Custody Operations

our field officers. Geofeedia’s location-based social

Division, Correctional Services Division, Detective Division,

media monitoring solution is a powerful tool to help us

Court Services Division, Technical Services Division, Office

deliver that value.”

of Homeland Security, Administrative Services Division, and

- Commander Mike Parker

gathering real-time intelligence” said Deputy Moore,

Leadership and Training Division. Learn more at: lasdhq.com

adding, “We’re not shy about recommending this ability to

northeast Ohio town. In reviewing the social media within

other agencies as this simplifies a lot of things and will help

the perimeter she had drawn, the Sergeant came across

other agencies accomplish their public safety mission.”

individuals who had posted to Facebook about going to

sales@geofeedia.com

@geofeedia

The Geofeedia website has archived a number of

a “93rd Street block party”, which was a common gang

law enforcement Case Studies which can be accessed by

reference often synonymous with being up to no good.

law enforcement officials. These include one study which

Through this connection, was taken toSheriff’s one of the Geofeedia Case Study: Los she Angeles County Department

describes how situational awareness was established

town’s known gang members who was also talking about

by a group in West Virginia, using Geofeedia’s social

the block party, and shortly thereafter, the gang member

media monitoring software and drawing a perimeter

was identified as one of the attackers, which led to an

around locations such as specific colleges or universities,

arrest by the town’s gang unit.

neighborhoods, city blocks or specific buildings.

security, branding or healthcare,” said Phil Harris, “but

draw a perimeter around the scene of a brutal attack by

it’s a game-changer for law enforcement, public safety,

20 men that had taken place outside of a gay bar in a

emergency response and health crises.” Ω

October/November 2014

geofeedia.com/demo

“Geofeedia can be used by the media or for corporate

In another, a Patrol Sergeant used Geofeedia to

14 Government Security News

by location. Our patented technology searches Twitter, Facebook, Instagram, YouTube, Flickr, Picasa, and Viddy

would cause annually.

sexual assaults, related property damage,

advertised via social media networks.

Geofeedia provides social media search and discovery

Digitlal Edition

Digitlal Edition

October/November 2014

Government Security News 15


BriefCam Syndex offers rapid review Video Synopsis video solution at Israel Exhibition BriefCam®, the developer and provider of Video Synopsis® solutions for the rapid review, analysis and indexing of video, has announced a new offering

...

To Secure a Perimeter

Law Enforcement Communications • Briefcam BriefCam successfully in the field. These include the departments of defense, the law enforcement agencies, and

success is all about choosing the Right Products.

■ The right Barriers

■ The right Sensors

■ The right Gates

■ The right Fences

■ And most important of all,

the right Guard Station/House

the intelligence communities in North America, Europe, China, the APAC region and, of course, Israel.”

If you don’t protect your staff and systems, they can’t protect your students and faculty A B.I.G. guardhouse is different from all others because we have invested over 40 years in studying and understanding what goes on inside—and outside—of a superior guard station. This expertise comes to you in the form of a full line of B.I.G. Enterprises guardhouses—the cornerstones of your “hardened” perimeter. With B.I.G. your guardhouse doesn’t have to appear hard and unattractive—it can be your steel fist inside of a velvet glove.

BriefCam Syndex is a next-generation product range based on Video Synopsis technology. (See: YouTube/ BriefCamVS). Video Synopsis is the simultaneous presentation of objects, events and activities that occurred at different times. Users can pinpoint events Continued on page 32

tailored to the needs of government investigative agencies and law enforcement: BriefCam Syndex GV, to be available in Q1 2015. The announcement was made at the Israel HLS Exhibition (iHLS 2014) running from November 1012 in Tel-Aviv. “Two years ago, we won the iHLS Innovation Award 2012. Since that time,

We Didn’t Want Standard Shelters, We Wanted B.I.G. “Some folks make cheaper booths, but no one makes a better booth than B.I.G. They build superior, high-quality modular booths. The highest quality in the U.S."

our product line has matured, our client base has expanded, and BriefCam has been used and recognized for its role in major criminal and homeland security-related investigations. For all of these reasons, we’re proud to be able

— East Coast Facility Manager

to announce BriefCam Syndex GV at Israel HLS 2014,” said Dror Irani, CEO and President of BriefCam. “This offering meets the needs of government agencies and was developed in response to direct feedback from high-profile users already employing 16 Government Security News

October/November 2014

BriefCam Syndex. The Video Synopsis can be refined by parameters such as color, direction, speed, size and area of interest / exclusion. New features include multiple video source capability, access restriction, floating camera licenses, mobile supprt and more Digitlal Edition

When overseeing the safety of your campus, call in the security heavyweights —because a perimeter without B.I.G. is like a holster without a gun.

Digitlal Edition

October/November 2014

Government Security News 17


Law Enforcement Communications • Capital Shield Program

ABOUT CAPITAL SHIELD

Kastle Systems and Metropolitan DC Police launch “Capital Shield” city-wide network of video cameras and floor plans to enhance first responder situational awareness

Capital Shield is a public-private partnership that unites the Washington, DC Metropolitan Police Department (MPD) with commercial property owners, businesses and institutions around a common goal of protecting the city. Through this program, participants can help enhance public safety by providing the MPD with direct access to their security cameras. This enables first responders to quickly gain the situational awareness required to most effectively assist and respond to major security events and emergency situations. For more information, visit www.capitalshield.org. Ω

I

n an innovative initiative backed by the city’s major real estate owners, managed security services firm Kastle Systems has launched an interconnected network of private security cameras, floor plans and other building information in partnership with the DC Metropolitan Police Department (MPD) that will allow first responders direct network access in order to enhance situational awareness in responding to emergencies and serious threats. According to the press announcement, the launch of “Capital Shield” is a culmination of nearly three years of collaboration between Kastle and the MPD, with the shared goal of making the nation’s capital safer and more secure. It is enthusiastically supported by major DC real estate firms, including Douglas Development, Vornado Realty Trust, ON Hoffman, First Potomac Realty Trust, The Tower Companies and Tishman Speyer. To catalyze the program, Kastle Sytems is donating 1,000 new security cameras to any real estate owner in the city that wants to participate in the program and has already deployed test sites with an additional 300 cameras expected to come online in the first phase. “Through this public-private partnership, Capital Shield will significantly increase the public safety of our nation’s capital,” said Kastle owner and DC area native Mark Ein. “There are thousands of existing cameras that should be made accessible to our police in times of need, and this program will add thousands more over time. The role of video security has never been more important or more evident in cities across the country. Modern video technology saves lives, catches criminals,

18 Government Security News

October/November 2014

ABOUT KASTLE Kastle Systems has been a leader in the security industry for more than 40 years with new technologies and advanced

security solutions. Kastle operates and manages security systems for its clients remotely, around the clock. Currently, Kastle protects over 10,000 locations nationwide and internationally today. Kastle’s outsourced security services significantly reduce costs and improve the critically important 24/7 performance of security systems for building owners, developers and tenants. Kastle Video delivers the latest advancements in monitored video solutions, including high-definition cameras, cloudenabled network recording and cutting edge video analytics. Headquartered in Falls Church, VA Kastle is the largest security company in DC, according to the Washington Business Journal. Kastle Systems also has offices in Los Angeles, San Francisco, Houston, Dallas, Chicago, New York, Philadelphia and Sydney, Australia. For more information on Kastle Systems, visit www.kastle.com or call 855-527-8531. Ω

deters crime and accomplishes something we all value – a safer city. Kastle is proud of the role we are playing to help DC. In further comments, Chief Cathy L. Lanier of the MPD added, “Video is a force multiplier for MPD. It gives us an extra set of eyes by allowing us to provide much needed situational awareness. The Capital Shield program is an important new step in working with private enterprise to enhance public safety throughout the city. I would like to extend a special thanks to our inaugural members and to Kastle for its donation to help the city make this a reality.” Speaking on behalf of his company and the other participating real estate firms, Patrick Tyrrell, Chief Operating Officer of Vornado/Charles E. Smith stated, “As owners in Washington, DC, our company supports the goal of a safe and secure city. Vornado is delighted to be an inaugural participant and to work with Kastle on the Capital Shield program to make a positive and lasting contribution to DC. The very presence of Capital Shield will make our buildings safer for our tenants, our residents and our surrounding communities.” Digitlal Edition

Digitlal Edition

October/November 2014

Government Security News 19


Mutualink, Inc.

1269 South Broad Street Wallingford, CT 06492

Law Enforcement Communications • Mutualink

RE D EFININGUnveils I NTEROPERA BIL IT Y Mutualink Breakthrough Mobile Go Kit for

Phone: (866) 957-5465 Web: www.mutualink.net E-Mail: info@mutualink.net

Affordable InteroperableIntuitive Public Safety Communications at IACP 2014

Controllable

I

n an important interoperable communications technology at the 121st Annual International

Key features include:

Interoperability Workstation | IWS

• Best-in-class security with military-grade encryption • Ease of use and deployment, with plug and play The Mutualink interoperable communications technology company, IWS provides an incident-based highly intuitive graphical user interface (GUI) functionality that can be effectively used by a dispatcher or incident manager to communicate with other introduced its Mobile Go Kit for first responders. In • Wide-area multi-mode involved dispatch personnel as well as with unitsconnectivity in the field. Interconnection of radio channels/ times of crisis, this easy-to-transport case for on-thetalkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either Chiefs of Police (IACP) conference, Mutualink, an

“Mutualink developed our interoperability solution as a mini-console, or in combination with an existing console position. The IWS is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink to enable first responder agencies to securely share safety officials and emergency managers to establish software is easy to manage for System Administrators and other key personnel. The IWS is the disparate radio, video and telephone communications secure command and control on the move, anywhere. primary operational user interface the Mutualink system. It consists of a standard x86 PC with each otherfor during emergencies,” said Mark Hatten, The kit connects to 4G LTE/3G or hard-wired internet, platform (desktop, laptop, etc.) running the Mutualink real-time communications application on Mutualink’s CEO. “Our new Mobile Go Kit puts all of that bridging radio and telephone and enabling first a Security Enhanced interoperability (SE) Linux operating system. into one case that can be set up in a

S

go interoperable communications enables public stand-alone,

responders to send and receive full motion video, files

and text messages from remote locations. The Mobile Go Kit, as shown at the Mutualink booth, contains an Interoperable Workstation (IWS), which allows public safety agencies to participate on the nationwide Interoperable Response and Preparedness Platform (IRAPP) network to collaborate with federal, state and local agencies, regardless of location.

20 Government Security News

mobile vehicle or transported to a temporary emergency management facility for real-time, ad hoc collaboration.” In Passaic County, New Jersey, the first Go Kit has already been made part of a counter-terrorism toolkit, ready to assist as the county prepares for any man-made or natural threat to security. The kit provides a fully portable information sharing solution; a flexible way to deploy resources as, when and where needed to attain inter-agency collaboration.

Standard Fixed Workstation DESKTOP IWS M500-100 Series

October/November 2014

Digitlal Edition

About Mutualink, Inc.

Digitlal Edition

October/November 2014

Government Security News 21


æ

S IWS

stand-alone, as a mini-console, or in combination with an existing console position. The IWS UPFRONT is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink software is easy to manage for System Administrators and other key personnel. The IWS is the primary operational user interface for the Mutualink system. It consists of a standard x86 PC Law Enforcement Communications • Mutualinkplatform (desktop, laptop, etc.) running the Mutualink real-time communications application on a Security Enhanced (SE) Linux operating system.

Ruggedized Mobile Workstation IWS M500-150 Series

Phone: (866) 957-5465 Web: www.mutualink.net E-Mail: info@mutualink.net

RE DE F I NI NG INTERO PERABILITY Controllable

Intuitive

Mutualink, Inc.

1269 South Broad Street Wallingford, CT 06492

Affordable

About Mutualink, Inc.

F-35C Completes First Arrested Landing aboard Aircraft Carrier

T

he U.S. Navy made aviation history Nov. 3 as an F-35C Lightning II carrier variant Joint Strike Fighter conducted its first arrested landing

aboard an aircraft carrier off the coast of San Diego. Navy test pilot Cmdr. Tony Wilson landed F-35C test

aircraft CF-03 at 12:18 p.m. aboard USS Nimitz's (CVN 68) Also at the IACP event, Mutualink demonstrated Mutualink is an IP-based multimedia communication resource sharing platform that allows public safety agencies and critical community assets to communicate in a manner that is deck. flight its resilient peer-to-peer collaboration network for

separate and apart from the general public. The arrested landing is part of initial at-sea public safety, which provides proven, secure, reliable ABOUT MUTUALINK Mutualink technology is subject to US Patent #7,643,445, #8,364,153, #8,320,874 and Developmental Testing I (DT-I) for the F-35C, which communications for mission-critical homeland security other patents pending. Mutualink, Inc. has developed an interoperable commenced Nov. 3 and is expected to last two weeks. and law enforcement needs. The platform won the U.S. communications platform that enables community-wide Department of Defense (DoD) Joint Interoperability Test LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom £ Voice: "Today is a landmark event in the multimedia sharing of radio, voice, text, video, data files £ Video: Command certification for both Information Assurance live feeds from buildings, streets, cruisers, copters development of the F-35C," said Wilson, £ Text Messaging:and more effectivecommunications than voice for informational content telephone in a secure environment. and Interoperability. £ File Sharing: blue prints, floor plans, photos, procedures Mutualink’s system is currently deployed by hundreds a Navy test pilot with Air Test and IACP attendees at IACP enjoyed hands-on £ PA and Intercom System Interface: Broadcast Emergency Messages of public and private entities worldwide, including Dispatch Collaboration: off-the-air conferencing between dispatch centers Evaluation Squadron (VX) 23. "It is the demonstration of how a panic button trigger£an Thecan Mutualink IWS provides anhomeland incident-based highly intuitiveinstallations, graphical user interface (GUI) security and defense NATO incident connecting schools (or other facilities) their used by a dispatcher or incident manager to communicate with other that can be with effectively culmination of many years of hard work Special Operations Forces, police and fire departments, involved dispatch personnel as well as with units in the field. Interconnection of radio channels/ local police department in the event of an emergency © 2013 Mutualink, Inc. transit authorities, shopping malls,can casinos, by a talented team of thousands. I'm very talkgroups is facilitated using Mutualink’s drag andhospitals, drop interface. An IWS be used either using Mutualink’s K12 solution. In such an incident, Mutualink a privately-held company stand-alone, as apolice mini-console, and or inmore. combination withis an existing console position. The IWS excited to see America's newest aircraft departments can then invite other community is simple to partners use and easy to maintain. In addition, the multi-featured andR&D robust Mutualink headquartered in Wallingford, Conn., with software easy to manage for System and other personnel. TheRico, IWS is the on the flight deck of her oldest aircraft like hospitals, fire departments or state and is federal facilitiesAdministrators in Westford, Mass. and key Mayagüez, Puerto primary operational user interface for the Mutualink system. It consists of a standard x86 PC agencies participating on the IRAPP platform as necessary to laptop, etc.) running and Defense Services office nearby Washington, application DC. For on carrier, the USS Nimitz." (desktop, the Mutualink real-time communications more information please visit www.mutualink.net. Ω respond to and mitigate the emergency. a Security Enhanced (SE) Linux operating system. Commander, Naval Air Forces, Vice Adm. David H. The company’s suite of interoperability capabilities is Buss, was aboard Nimitz to witness the milestone event.

Ruggedized Interoperability Workstation | IWS

deployed and in use in the Orlando Police Department,

"What a historic day today is for Naval Aviation. With

as well as various area hospitals, schools, malls and other

the first traps and launches of the F-35C Lightning II

Critical Infrastructure and Key Resource (CIKR) entities.

Ruggedized Mobile Workstation IWS M500-150 Series

22 Government Security News

October/November 2014

aboard an aircraft carrier, we begin the integration of the next generation of warfighting capability into our carrierbased air wings," said Buss. "This important milestone is

Pacific Ocean (Nov. 3, 2014)

yet another indicator of Naval Aviation's ongoing evolution to meet future threats and remain central to our future Navy and National Defense Strategy." DT-I is the first of three at-sea test phases planned for the F-35C. During DT-I, the test team from the F-35 Lightning II Pax River Integrated Test Force (ITF) has scheduled two F-35C test aircraft from Naval Air Station Patuxent River in Patuxent River, Maryland to perform a variety of operational maneuvers, including various catapult takeoffs and arrested landings. ITF flight test operations also encompass general maintenance and fit tests for the aircraft and support equipment, as well as simulated maintenance operations. As with the initial testing of any new aircraft, the goal is to collect environmental data through added instrumentation to measure the F-35C's integration to flight deck operations and to further define the F-35C's operating parameters aboard the aircraft carrier. The ITF test team will analyze data obtained during flight test operations, conduct a thorough assessment of Continued on page 31

Digitlal Edition

Digitlal Edition

October/November 2014

Government Security News 23


å Romanowich on Video Surveillance Smart thermal cameras that incorporate video analytics provide substantial advantages over this

New physical standards in the works for electrical substations Attacks on transformer substations and other

traditional approach, increasing the probability of intruder detection while greatly reducing the nuisance alarms that have plagued automated perimeter systems in the past. These systems cover large distances and detect what a human would miss, while delivering John Romanowich President and CEO of SightLogix

components of the electrical grid in North America have

immediate, actionable information to enable fast response decisions. For this reason, many electrical utilities are already

underscored the risks associated with physical security

and vulnerabilities of physical attacks on the targets

using smart thermal video cameras to provide accurate,

breaches and the potentially disastrous consequences.

they’ve identified as most critical, and then deploy

reliable performance in even the

With the tens of thousands of substations across the U.S.

and implement physical security plans to cover those

most challenging conditions. For

situated in locations that range from isolated remote

locations. Finally, utilities will undergo another third-

example, some smart thermal

areas to densely populated urban areas, the job of

party review to evaluate their gap analysis and physical

cameras can discriminate small

securing these critical assets is challenging at best for

security plans. These requirements will be implemented

differences between the temperature

security professionals.

in phases, giving utilities adequate time to prepare for

of a person and the background,

and implement physical security upgrades.

accurately detecting intruders even

To provide guidelines to ensure greater physical security around substations, the Federal Energy

Equipment selection and purchase will be crucial

This underscores the need for security

technologies for ensuring compliance with this fast-approaching regulation. SightLogix Thermal SightSensor

True security means stopping an event by detecting intruders as early as possible,

in less than ideal conditions. They

latest Critical Infrastructure Protection (CIP) standard.

understand what utilities will be looking for. When it

lighting issues that cause false detections with visible

Developed by the North American Energy Reliability

comes to equipment, utilities are generally hesitant

light cameras. Because they can detect in complete dark,

Corporation (NERC), CIP-014 is a mandatory physical

to invest in products that have no real track record of

bright sunlight, or poor weather, smart thermal cameras

security standard for critical components of the

success. They also want to ensure that they are receiving

can be counted on to secure outdoor areas 24/7. The

power grid that is expected to be finalized soon. Upon

the best return on their investment in physical security.

alerts smart thermal cameras generate when – or even

completion, CIP-014 will serve as a blueprint to help

Traditionally, utilities have relied on a combination of

before – an intrusion occurs, allow security personnel to

both utilities and security professionals understand the

some type of blind sensor – such as coax or fiber on a

view real-time video to determine if there is activity to be

requirements to protect these vital assets.

fence to act as an activity detector – with video security

stopped. This advanced detection provides alerts before

solutions, but the reliability and accountability of these

an individual has an opportunity to steal, vandalize or

to identify their most critical substations – those that if

systems is diminished by the many nuisance alerts they

disrupt substation operations.

damaged or taken offline would cause major problems

generate. These blind sensors also fall short of the intent

for the power grid. To comply, utilities will need to

of this new regulation to provide early detection outside

laid out in CIP-014, the remainder are expected to follow

perform a gap analysis to evaluate potential threats

of the fence line for advance warning.

suit in the near future to ensure their planned physical

Digitlal Edition

work necessitated by these upgrades at their substations.

themselves on CIP-014 and the best

will ignore headlights, reflections off water, or other

October/November 2014

acquire proper permits for any construction or other

installers and integrators to educate

to meeting CIP-014 requirements, so it’s important to

24 Government Security News

any issues with light and/or sound around the site, and

solution providers and system designers,

Regulatory Commission (FERC) is currently finalizing the

Following CIP-014’s finalization utilities will be tasked

security upgrades meet local zoning regulations, address

While some utilities have already begun the processes

Digitlal Edition

ideally before they enter a secured area, and alerting security staff. When it comes to protecting these critical assets, this real-time awareness is critical to ensuring a timely response and preventing theft, vandalism, accidents and other potentially dangerous activities or events that could disrupt the stability of the power grid. Given their proven track record of providing a high level of security for substations, smart thermal systems are the most reliable solution for providing the advanced detection and real-time awareness necessary to protect substations while satisfying CIP-014 security mandates. Ω John Romanowich is the President and CEO of SightLogix

October/November 2014

Government Security News 25


æ CASE STUDY

THE PORT OF CHARLESTON, SC

his credentials was needed to customize a plan complying

based on turn times,” Brown explained. “But you’ve got

with new legislation.

shipping lines that rely on the Port Authority to securely transfer their cargo and 105 Regulations in place, so Port

IDENTIFYING THE CHALLENGES

Police needs the security of the terminal ensured.”

In evaluating program options, Brown considered

PURETECH SYSTEMS

issues as one of the most difficult functions he performs,

ensuring secure transfer of cargo was a key focus at

and cites strong communication as the key to effectively

Wando Welch Terminal, and roving patrols by Port Police

bridging the gap between Operations and Security. He

managed loss prevention. With the prospect of terrorist

coordinates closely with port operations, engineering,

breach, a system that could reliably detect and monitor

IT and maintenance teams. He also regularly consults

disturbances at the perimeter became the new paradigm.

port police, customs and border protection, the U.S.

successfully addressed a marine environment; one that

program at Port of Charleston created by Congress under

remained in near constant motion between ship, vehicle

the guidance of the Department of Justice to enhance

and foot traffic. This scenario would trigger nuisance

port security operations, capabilities and coordination. By

alarms in most security systems, so the new system

understanding and addressing the needs of each of these

and ignore traditional environmental Brown is a civil engineer with an imposing

ports along the United States’ Southeast and

background in antiterrorism force protection, blast-

Gulf coasts. Moving more than 600,000 pier

resistant structural design and high security access

disturbances to avoid desensitizing monitoring personnel with false positives. Another challenge was balancing

containers per year and ranked 8th largest U.S. port

control for the U.S. government and military. Prior to his

in cargo value, with $50 billion in annual shipments,

involvement with Port of Charleston, he served as team

Charleston is recognized as North America’s most

leader for the U.S. Coast Guard’s National Facility Security

efficient and productive port. As a vital hub for global

Plan Review Center, whose mandate was to review U.S.

terror measures had the potential to

freight transfer, implementing a site protection solution

ports for compliance with 33 CFR Part 105 Regulations.

slow the pace of a facility consistently

that would safeguard facility infrastructure without

These post-9/11 performance guidelines call for

recognized for high productivity. It was

adverse affect to flow of cargo was a critical goal.

perimeter monitoring, access control and anti-terrorism

imperative to narrow the solutions to

readiness for marine facilities receiving regulated

those that delivered superior intrusion

terminal, both in cargo volume and physical size. Jeff

cargo, and require that restricted areas - both land and

detection without being cumbersome to

Brown, HNTB consultant and contractor to South Carolina

waterside perimeters - be continuously monitored.

administrate.

Wando Welch Terminal is Port of Charleston's largest

the divergent priorities of airtight terminal security and efficient cargo transfer. By definition, complex counter-

State Port Authority, has managed the SCSPA security

As the Coast Guard representative responsible

“At the very core, Port Operations

program since 2005. Overseeing perimeter protection

for reviewing South Carolina State Port Authority’s

and Port Security are 180 degrees out

and access control for the Port’s terminals, he was tasked

facility security plan, Jeff evolved into directing Port of

of phase because Operations wants to

with enhancing Waldo Welch’s perimeter security system.

Charleston’s security operations when a consultant with

move cargo as quickly as possible. It's all

26 Government Security News

October/November 2014

Coast Guard, and Project Seahawk – an innovative pilot

needed the intelligence to recognize WWT© Marvin Preston 2011

P

ort of Charleston is one of the busiest container

the Port’s unique security challenges. Prior to 9/11,

A must for Brown was finding a solution that

Integrating Fence Detection And Video Analytics

Brown describes working through these conflicting

Digitlal Edition

Digitlal Edition

October/November 2014

Government Security News 27


æ CASE STUDY

service that included 24-hour response time, 72-hour resolution of issues and a 3-year warranty on installed

THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS

product.

constituents, Brown has manages to deliver a security

AN INTELLIGENT SOLUTION

program that satisfies all parties.

According to Port of Charleston’s Security Improvement

DEVELOPING A PLAN

Plan, a key requirement of the new perimeter system

Mapping out security program expansion guidelines for

was its ability to precisely locate fence line breaches

each of the facility’s five non-continuous terminals was

and monitor intruders from point of attack through

Port of Charleston’s greatest challenge.

incident resolution. Brown acknowledged that it would be

“105 Regulations say that you have to monitor your

unmanageable and costly to install cameras along every

perimeter and access points, but it’s up to the individual

linear foot of its irregular boundary for this purpose.

PureActiv® provides intelligent video analytics, 3D geospatial command and control, autonomous PTZ tracking and open architecture for ease of integration with the MicroPoint™ Cable system.

Southwest Microwave’s MicroPoint™ Cable system pinpoints fence cut or climb attempt to within 3m, while ignoring environmental disturbances such as wind, rain or vehicle traffic.

Instead, the Port chose two market-leading intelligent

an industry best-practice concept incorporating solutions

in the Port’s ongoing success in securing grant monies for

pinpoint intrusion location and tie-in of detection zones

that delivered the protection required by Port Authorities,

bringing the security upgrades to fruition.

to CCTV camera presets - and PureTech’s PureActiv®

autonomous PTZ tracking and open architecture which

wide area video surveillance system - which successfully

easily integrated with MicroPoint™ and our Lenel access

identified and tracked qualified targets.

control system.”

entities to figure out how to comply,” Brown explained. To address this responsibly, Brown and his team formulated a comprehensive Security Improvement Plan -

and addressed the risks identified by the Port during

THE INTEGRATION PARTNER

vulnerability assessments. “To put together a plan of this magnitude, we had

Upon plan approval, Brown tackled hiring a systems

detection solutions: Southwest Microwave’s INTREPID™ MicroPoint™ Cable fence detection system - which offered

"There weren't many companies who could deliver

Brown recognized that the Southwest Microwave

to take a holistic approach,” outlined Brown. “There

integrator to handle the installation. To attract only highly

what we wanted," said Brown. "We went through an

fence detection system had been successfully paired

was extensive coordination between Operations and

qualified candidates, he employed rigorous selection

exhaustive process to ensure that we were going to get

with PureTech's video analytics package at many other

Security. Each of the Port’s various internal and external

criteria that included evaluation of each firm’s technical

the most appropriate, best of breed perimeter security

sites. “The fact that this was not the first time these two

constituents were consulted.”

certifications, breadth of manpower, implementation

system."

products have been integrated, that all the kinks had

Traffic flow at each terminal was evaluated toward restricted area boundary redefinition, and detailed site diagrams and project cost estimates were developed.

history for similar systems and quality assurance parameters. “We had our design, so everyone would be delivering

The synergistic solution they selected enabled the Port to strategically place visible light, infrared illuminated

been ironed out, was invaluable to me.”

and thermal pan-tilt-zoom cameras controlled by the

EXTENSIVE TESTING

The plan eventually included equipment design and

the same product,” Brown recalled. “I wanted to

PureActiv system at key points along the perimeter, and

Once the MicroPoint™ Cable / PureActiv® system was

performance specifications for the initial upgrade at

know how a prospective partner would strategically

integrate them with the MicroPoint™ Cable system to

installed, the Port’s security team, I-Sys Corporation and

Wando Welch Terminal.

approach the installation, and what they would do to

quickly locate and react to intrusions across the port’s

PureTech conducted thorough performance verification

set themselves apart. We expected a thorough plan of

vast property.

testing to ensure round-the-clock functionality at every

“This master plan has been critical to the success of Port of Charleston’s security program,” Brown emphasized. “All affected parties agreed on it. Everybody

action.” Port of Charleston ultimately selected I-Sys

®

“We chose MicroPoint™ because it was the only sensor that could detect to within 3 meters

point along the fence line. “We painstakingly went to each camera and had an

understands what is expected, how it will be delivered

Corporation of North Charleston, South Carolina.

and direct camera PTZ activity to incident location,”

‘intruder’ run, walk, roll, crawl and climb the fence to

and what the price tag will be.” In fact, Brown reports that

Along with capabilities that satisfied Brown’s stringent

Brown explained. “PureActiv provided intelligent

ensure that cameras and fence sensors worked properly,”

the plan's elaborate detail has been an important factor

requirements, I-Sys committed to providing a level of

video analytics, 3D geospatial command and control,

said Brown. With an extensive array of PTZ cameras, this

28 Government Security News

October/November 2014

Digitlal Edition

®

Digitlal Edition

October/November 2014

Government Security News 29


æ

æ

UPFRONT

CASE STUDY

Continued from page 23

THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS

how well the F-35C operated in the shipboard environment, and advise

endeavor took weeks to complete. While Brown concedes

that reinforces both systems' smart sensor capabilities.

that the testing was more rigorous than most, results

MicroPoint's unique ability to assign detection zones in

were overarchingly positive.

system software at any point along the cable has reduced

"I expected our vendor to prove to me that the

hardware requirements and simplified assessment.

system was ready to do what it needs to do," Brown

PureTech's analytics can identify targets at long ranges,

recalled. "They knocked it out of the park. It was an

minimizing the required number of cameras and

amazing success." In fact, Brown remarked that in

simplifying monitoring processes. By employing standard

general, the new solution far exceeded his expectations

cameras, the PureActiv system further reduces cost and

both during the testing phase and initial implementation.

gives the port installation flexibility without compromising

®

detection standards.

A SOLID SOLUTION

“I could not be more pleased with the new system,"

Port of Charleston's new perimeter detection system

Brown stated emphatically. "I do not think there are other

solves the facility's main concerns, terrorist breach and

products out there that do what MicroPoint™ Cable and

cargo loss.

over the next few decades," said Lt. Gen. Chris Bogdan, F-35 Program Executive Officer. "For months, we've been working with the Nimitz crew, Naval Air Forces, and our industry partners, Lockheed Martin and Pratt & Whitney, as well as their suppliers, to prepare and train for this event. We plan on learning a lot during this developmental test and will use that knowledge to make the naval variant of the F-35 an even more effective weapons platform." The F-35C combines advanced stealth with fighter speed and agility, fused targeting, cutting-edge avionics, advanced jamming, networkenabled operations and advanced sustainment. With a broad wingspan,

capabilities of carrier air wings and joint task forces and will complement

disturbances, then smoothly tracks and manages

the capabilities of the F/A-18E/F Super Hornet, which currently serves as

qualified events until they are resolved.

the Navy's premier strike fighter.

Each product has contributed to solving

By 2025, the Navy's aircraft carrier-based air wings will consist of a

environmental nuisance alarm issues common

mix of F-35C, F/A-18E/F Super Hornets, EA-18G Growlers electronic attack

to other detection technologies. MicroPoint™

aircraft, E-2D Hawkeye battle management and control aircraft, MH-60R/S

effectively identifies fence attacks while ignoring

helicopters and Carrier Onboard Delivery logistics aircraft.

distributed environmental disturbances such

The successful recovery of the F-35C represents a step forward in the

as truck traffic at the Port. PureActiv® copes

development of the Navy's next generation fighter and reinforces Navy-

exceptionally well with the diversity of port

industry partnership goals to deliver the operational aircraft to the fleet in

environments, including busy waterside cargo loading areas, long fence lines, active roadways and

PureActiv® can. These solutions are so well integrated

controlled entrance and egress points.

that I almost forget that they are two separate systems. The entire perimeter security system performs the way

delivered the Port a cost-effective solution for detecting

it’s supposed to. If every system I implemented worked as

intrusions along a lengthy perimeter, and an efficiency

well, then my job would be easy.” Ω

October/November 2014

for today. This will be one landing out of thousands more that will happen

The F-35C will enhance the flexibility, power projection, and strike

PureTech’s PureActiv® system reliably analyzes

Digitlal Edition

January-March, 2015

"Our F-35 integrated test team has done an amazing job preparing

delivering a lethal combination of fighter capabilities to the fleet.

a cut or climb attempt to within one fence panel.

December 2014

generation fighter is fully capable and ready to deploy to the fleet in 2018.

the F-35C is designed to stand up to harsh shipboard conditions while

Cable system allows the Port to confidently pinpoint

The MicroPoint™ Cable / PureActiv® solution has

the Navy to make any adjustments necessary to ensure that the fifth-

reinforced landing gear, ruggedized structures and durable coatings,

Southwest Microwave’s INTREPID™ MicroPoint™

30 Government Security News

Coming Attractions

2018. For more news from Commander, Naval Air Forces, visit www.navy.mil/local/airpac/. Ω

Digitlal Edition

December Digital Edition 2014 Digital Yearbook of Homeland Security Awards Recipients January Print Edition Technology Focus: Perimeter Protection and Short Wave Detection Market Sector Focus: Airport/ Aviation Security February Digital Edition Technology Focus: Access Control/ID, Biometrics Market Sector Focus: Energy, Nuclear, Infrastructure And Grid Protection March Print Edition Technology Focus: Cybersecurity/Closing The Gap Market Sector: Maritime/Port Security Topics We’re Following Throughout the Year: Protecting the Grid Closing the Cyber Gap The Immigration Crisis Social Media in Law Enforcement

October/November 2014

Government Security News 31


Continued from page 16

of interest, reach targets quickly and take action as

“As security cameras proliferate, more and more

required. BriefCam stresses ease of use, integrating user

investigations are crowdsourcing video from the public

experience and intuition as a vital part of the process; the

for intelligence gathering and post-event investigation,”

human mind and eye are always engaged.

Irani noted. “More evidence is a boon to investigators

In addition to fast video review, BriefCam Syndex

but also means hours, days and even weeks of video are

augments the basic Video Synopsis by providing users

collected – that’s where rapid video review is absolutely

with a powerful set of tools for searching video according

essential. Crowdsourcing also increases the need for

to attributes that

greater control over privacy.”

they define: size,

In line with the trend, BriefCam Syndex GV’s enhanced

color, speed,

collaborative investigation tools include permissions

direction and

limitations so that camera access is restricted in

location within

accordance with the individual investigator’s viewing

the frame. All

rights. Ω

parameters are under the user’s control – even the

ABOUT BRIEFCAM

order of objects

BriefCam®, Ltd. is the developer and provider of Video Synopsis®, an award-winning technology that summarizes hours of events into a “brief ” that extracts maximum value from video, recorded and live. BriefCam products interface with a wide range of video recorders, advanced IP cameras and complement existing surveillance solutions. BriefCam is winner of the 2013 SIA New Product Showcase for Video Analytics, 2012 Israel HLS Technology Innovation Award, 2011 ASIS Accolades Award - Surveillance, 2010 IFSEC Security Industry Award - Best CCTV System Product, 2010 Wall St. Journal Technology Innovation Award - Physical Security and others. Founded in December 2007, BriefCam, Ltd. is headquartered in Modi'in, Israel, with subsidiaries in Connecticut, USA and Shanghai, China. For more information: www.briefcam.com. For updates: https://twitter.com/BriefCamVS.

displayed. Like all search engines, BriefCam Syndex ranks results in

Review hours of video in minutes. Select, view and zoom in on events of interest

order by probability to ensure the most relevant events of interest are presented first. BriefCam Syndex is also offered as a standalone product intended mainly for law enforcement and individual security investigators (FS) and for investigative teams (FS+), or as an integrated/embedded product within the VMS environment for medium-sized enterprises (EP) and large/growing ones (EP+). New features incorporated into BriefCam Syndex GV include floating licenses so that cameras can be assigned and reassigned among authorized users, mobile (thin) client support, in/out zoom, and multiple video source capability that enable processing of video input from the agency-owned VMS as well as from imported external video footage. 32 Government Security News

October/November 2014

Digitlal Edition

G O V E R N M E N T

Security News

The News Leader in Physical, IT and Homeland Security Publisher:

Columnist:

Interim Production Manager:

Michael Madsen (O) 212-344-0759, X1 (C) 732-233-8119 mmadsen@gsnmagazine.com

John Convy Convy on Netcentric Security john@convyassociates.com

Executive Editor:

Vance Klein crosscheckdesigns.com (O) 212-344-0759, X4 (C) 914-245-6662 vancemk@mac.com

John Romanowich Romanowich on Video Surveillance jromanowich@sightloxic.com

John Wagley (O) 212-344-0759, X2 (C) 202-425-0196 Wagley.jr@gmail.com

Senior Writer: Lorrie Barclay (O) 212-344-0759, X5 (C) 508-685-0652 lorriebarclay@gmail.com

Columnist:

Guest Expert Contributor: Denise Rucker Krepp (C) 202-546-2533 kdrkrepp@hotmail.com

Editorial Director/CEO Adrian Courtenay (212) 344-0759, X3 (C) 917-696-5782 acourtenay@gsnmagazine.com MEDIA KIT

Art Director: Vance Klein crosscheckdesigns.com (O) 212-344-0759, X4 (C) 914-245-6662 vancemk@mac.com

SUBSCRIBE

Mailing Address: Government Security News P.O. Box 7608 Greenwich, CT 06836

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT , 06836, Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government decision makers and business executives involved with security products, Systems and series. Qualified U.S. subscribers received GSN: Government Security News At no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and foreign subscribers are charged $140 International Airmail. Copyright 2014 by GSN: Government Security News. All rights reserved. Printed in the U.S.A. GSN: Government Security News assumes responsibility for validity of claims in items reported. Digitlal Edition

October/November 2014

Government Security News 33


PIVotal Security.

pivCLASS® readers and software from HID Global provide security and compliance. HID Global’s pivCLASS® reader solutions PIV-enable existing physical access control systems (PACS) without the need to “rip and replace” valuable infrastructure, reducing costs, minimize disruptions, and preserving investments. And, HID’s pivCLASS off-the-shelf software solves the problem of validating, authenticating and registering PIV card data in a PACS – all without custom programming. pivCLASS software also automatically revalidates PIV card certificates periodically to make sure your PACS is always up to date. To make the pivotal move to compliance, visit hidglobal.com/piv-gsn © 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design and pivCLASS are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.

34 Government Security News

October/November 2014

Digitlal Edition


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.